Tracer Placement with Limitation nodes in Protection Area

碩士 === 中華大學 === 資訊工程學系碩士班 === 99 === Distributed Denial of Service (DDoS) attacks become one of serious network security problems in recent years. To defend DDoS attacks effectively is to find attack origins first by enhanced routes referred to as tracers. Then attack traffic can be blocked by filte...

Full description

Bibliographic Details
Main Authors: Ven-Chen Cheng, 陳文誠
Other Authors: Chun-Hsin Wang
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/33532800697451790321
id ndltd-TW-099CHPI5392046
record_format oai_dc
spelling ndltd-TW-099CHPI53920462015-10-13T20:22:59Z http://ndltd.ncl.edu.tw/handle/33532800697451790321 Tracer Placement with Limitation nodes in Protection Area 可控制防禦區域內節點數量追蹤器的佈建方法 Ven-Chen Cheng 陳文誠 碩士 中華大學 資訊工程學系碩士班 99 Distributed Denial of Service (DDoS) attacks become one of serious network security problems in recent years. To defend DDoS attacks effectively is to find attack origins first by enhanced routes referred to as tracers. Then attack traffic can be blocked by filter nodes close to attack origins. In addition, the log of attack origins can be used to the evidence for post-attack law enforcement. The performance of locating attack origins will depend on the number of deployed tracers and location of them. In previous work, tracers are placed to surround a network area which we referred to as protection area. Attack path can be guaranteed to travel at least one tracer within a limit hop count and attack origins can be traced back to which protection area is.But the cost of searching real attack origins will be high once the number of nodes in protection area is too many. In this thesis, we proposed five methods to improve previous work by bounding the number of nodes in each protection area. Simulation results show that our proposed methods can limit the number of nodes in protection areas with a little extra tracers compared to previous work. Keywords: DDoS;Tracers Chun-Hsin Wang 王俊鑫 2011 學位論文 ; thesis 47 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中華大學 === 資訊工程學系碩士班 === 99 === Distributed Denial of Service (DDoS) attacks become one of serious network security problems in recent years. To defend DDoS attacks effectively is to find attack origins first by enhanced routes referred to as tracers. Then attack traffic can be blocked by filter nodes close to attack origins. In addition, the log of attack origins can be used to the evidence for post-attack law enforcement. The performance of locating attack origins will depend on the number of deployed tracers and location of them. In previous work, tracers are placed to surround a network area which we referred to as protection area. Attack path can be guaranteed to travel at least one tracer within a limit hop count and attack origins can be traced back to which protection area is.But the cost of searching real attack origins will be high once the number of nodes in protection area is too many. In this thesis, we proposed five methods to improve previous work by bounding the number of nodes in each protection area. Simulation results show that our proposed methods can limit the number of nodes in protection areas with a little extra tracers compared to previous work. Keywords: DDoS;Tracers
author2 Chun-Hsin Wang
author_facet Chun-Hsin Wang
Ven-Chen Cheng
陳文誠
author Ven-Chen Cheng
陳文誠
spellingShingle Ven-Chen Cheng
陳文誠
Tracer Placement with Limitation nodes in Protection Area
author_sort Ven-Chen Cheng
title Tracer Placement with Limitation nodes in Protection Area
title_short Tracer Placement with Limitation nodes in Protection Area
title_full Tracer Placement with Limitation nodes in Protection Area
title_fullStr Tracer Placement with Limitation nodes in Protection Area
title_full_unstemmed Tracer Placement with Limitation nodes in Protection Area
title_sort tracer placement with limitation nodes in protection area
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/33532800697451790321
work_keys_str_mv AT venchencheng tracerplacementwithlimitationnodesinprotectionarea
AT chénwénchéng tracerplacementwithlimitationnodesinprotectionarea
AT venchencheng kěkòngzhìfángyùqūyùnèijiédiǎnshùliàngzhuīzōngqìdebùjiànfāngfǎ
AT chénwénchéng kěkòngzhìfángyùqūyùnèijiédiǎnshùliàngzhuīzōngqìdebùjiànfāngfǎ
_version_ 1718046367297830912